If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Respuesta: NEW SCRIPT Capturing Passwords With sslstrip AIRSSL.sh

Hi, I'm having the next error:

Code:

root@bt:~# /root/airssl.sh
AIRSSL 2.0 - Credits killadaninja & G60Jon
0.0.0.0 192.168.2.1 0.0.0.0 UG 0 0 0 eth0
Enter the networks gateway IP address, this should be listed above. For example 192.168.0.1:
192.168.2.1
Enter your interface that is connected to the internet, this should be listed above. For example eth1: eth0
Enter your interface to be used for the fake AP, for example wlan0: wlan0
Enter the ESSID you would like your rogue AP to be called: Nancy
Found 2 processes that could cause trouble.
If airodump-ng, aireplay-ng or airtun-ng stops working after
a short period of time, you may want to kill (some of) them!
PID Name
8976 dhclient
8995 dhclient
Interface Chipset Driver
wlan0 RTL8187 rtl8187 - [phy0]
(monitor mode enabled on mon6)
mon0 RTL8187 rtl8187 - [phy0]
mon1 RTL8187 rtl8187 - [phy0]
mon2 RTL8187 rtl8187 - [phy0]
mon3 RTL8187 rtl8187 - [phy0]
mon4 RTL8187 rtl8187 - [phy0]
mon5 RTL8187 rtl8187 - [phy0]
[+] Configuring FakeAP....
Airbase-ng will run in its most basic mode, would you like to
configure any extra switches?
Choose Y to see airbase-ng help and add switches.
Choose N to run airbase-ng in basic mode with your choosen ESSID.
Choose A to run airbase-ng in respond to all probes mode (in this mode your choosen ESSID is not used, but instead airbase-ng responds to all incoming probes), providing victims have auto connect feature on in their wireless settings (MOST DO), airbase-ng will imitate said saved networks and victim will connect to us, likely unknowingly. PLEASE USE THIS OPTION RESPONSIBLY.
Y, N or A
N
[+] Configuring forwarding tables...
at0: ERROR while getting interface flags: No such device
SIOCSIFADDR: No such device
at0: ERROR while getting interface flags: No such device
SIOCSIFNETMASK: No such device
SIOCSIFMTU: No such device
SIOCADDRT: No such process
[+] Setting up DHCP...
[+] Starting sslstrip...
[+] Configuring ettercap...
Ettercap will run in its most basic mode, would you like to
configure any extra switches for example to load plugins or filters,
(advanced users only), if you are unsure choose N
Y or N

Re: NEW SCRIPT Capturing Passwords With sslstrip AIRSSL.sh

Re: NEW SCRIPT Capturing Passwords With sslstrip AIRSSL.sh

Hey noobie here i am having problems with airssl.sh here are the adapters i am using

wlan0 Atheros ath5k - [phy0]
ra0 Ralink 2560 PCI rt2500

the ra0 is an alfa AWUS036nh
the wlan0 is my internet connection

here is my problem i have tried to kill the processes using sudo kill ---
and the just keep popping up with new process numbers also i get the at0 errors seen below if you need any more in pleas let me know

AIRSSL 2.0 - Credits killadaninja & G60Jon

0.0.0.0 192.168.0.1 0.0.0.0 UG 0 0 0 wlan0

Enter the networks gateway IP address, this should be listed above. For example 192.168.0.1:
192.168.0.1
Enter your interface that is connected to the internet, this should be listed above. For example eth1: wlan0
Enter your interface to be used for the fake AP, for example wlan0: ra0
Enter the ESSID you would like your rogue AP to be called: mine

Found 3 processes that could cause trouble.
If airodump-ng, aireplay-ng or airtun-ng stops working after
a short period of time, you may want to kill (some of) them!

Airbase-ng will run in its most basic mode, would you like to
configure any extra switches?

Choose Y to see airbase-ng help and add switches.
Choose N to run airbase-ng in basic mode with your choosen ESSID.
Choose A to run airbase-ng in respond to all probes mode (in this mode your choosen ESSID is not used, but instead airbase-ng responds to all incoming probes), providing victims have auto connect feature on in their wireless settings (MOST DO), airbase-ng will imitate said saved networks and victim will connect to us, likely unknowingly. PLEASE USE THIS OPTION RESPONSIBLY.
Y, N or A
a

Re: NEW SCRIPT Capturing Passwords With sslstrip AIRSSL.sh

Hi all !
I'm not trying to hijack your thread, but your script inspired me (well, taught me to be more precise) and I made a script of my own, with different means though. It's much simpler and works for local use. I of course gave you credit in the thread that people can find here : http://www.backtrack-linux.org/forum...utomation.html if they're interested !

Concerning your script I made changes for my own use. For example, why do you use airmon-ng when you could just set your interface to monitor mode ? It worked better for me when using

Keep in mind that you need to use my modified versions of hamster because for some reason the hamster port was showing up as in use, so I changed the default ip and port #. Just extract the tar to it's default folder in /root/ so they would be accessible at /root/moddedhamster/ferret -i eth0 for example. (download them here: http://www.mediafire.com/?7b12zu28185e1wp ) The instructions for hamster will show up when you get to that point.

Note to OP: If this is against your wishes in anyway, let me know and i'll pull the post.

Re: NEW SCRIPT Capturing Passwords With sslstrip AIRSSL.sh

Quick question. I have been trying this script over the weekend and wondered if anyone has any luck with the following scenario. I have my laptop with wlan0 and wlan1 each work in monitor mode/ injection mode. wlan1 is a alfa card wlan0 is the internal wireless intel wireless n 1000. But what happens when I run the script is I use my windows computer to test to see if it is capturing information and I cant see the network I am broadcasting from wlan1 and I can not longer access the network I am connected to on wlan0 although I can still browse from the machine running the script. Am I too hopeful that this can all be done wirelessly? Or does anyone see any inherent failures in my description here. The script appears to start and run correctly just no networks. Are you supposed to shut down the other wireless and just use the ethernet?

Re: NEW SCRIPT Capturing Passwords With sslstrip AIRSSL.sh

Let me say I'm quite impressed with this little one. Here's my experience with it:
Running Macosx 10.6.6 on 13" Aluminium Unibody Macbook with the following config:
VM software: VirtualBox 4.0.4
BT: BT 4 Final
Internal Airport Wireless: Used for internet access to my home's AP
External USB Encore Wireless Dongle: FakeAP
In order to make it work I had to make some minor changes to what I thought would be a straightforward thing.
1) On the VM, instead of setting the interface as NAT, had to set it as Bridged so it directly connected with my network.
2) Had to pass control of the USB Wireless Dongle to the VM(obviously)
3) If I started the script after starting interfaces (/etc/init.d/networking start) this happened: